Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

On-Demand Webinar

Protect Business Critical Operations

On-Demand

Protect business critical operations in IT/OT convergence by capturing complete visibility and interoperability gaps in your expanding threat surface

CISOs and security teams own “Enterprise-Wide Security Risk” but often have limited visibility into critical operations and assets.

If your enterprise relies on the Internet of Things (IoT) and/or operational technology (OT), there’s a good chance you are blind to the “invisible bridges” between your IT, OT, and IoT assets.

Effectively discover, measure, and minimize the risk posed by the invisible bridges in your environment.

Highlights

  • Why CISOs need to understand the risk created by exponential growth in connected OT and IoT devices
  • Closing visibility gaps and asset discovery challenges
  • Differences between passive and active discovery, how they work, the benefits of each technique, and when to use them
  • Use case - Smart meters and solar panels - Protecting the integrity of energy infrastructure with the rise of smart appliances, solar inverters, and smart meter

Who should watch?
CISOs, IT, OT/ICS operations and engineering leaders, and professionals responsible for ensuring the integrity, safety, and security of critical business systems and processes for any organization reliant on OT and IoT systems.

Speakers

Dave Reeves

Dave Reeves

Territory Manager, OT Security, Tenable

Dick Bussiere,  Technical Head of Operational Technology: APJ, Tenable

Dick Bussiere

Principal OT Security Engineer, Tenable

Watch Now